Sr. Google SecOps Engineer dedicated to onboarding and maintaining Sec Ops environments for Optiv clients. Collaborating in a 24x7 Security Operations Center to provide critical services.
Responsibilities
Serve as a primary responder for AFC customer systems, taking ownership of client configuration issues and tracking through resolution.
Act as a point of escalation for junior level Engineers and provide guidance and mentoring.
Advise best practice on SIEM/MDR/SOAR products to both technical and relatively non-technical personnel.
Provide remote consulting services via interactive client sessions to assist with implementation of multiple product vendors and technologies.
Implement and configure SIEM/MDR/SOAR software and appliance-based products in large enterprise and Government environments.
Develop and maintain security content and reporting.
Perform knowledge transfers to clients regarding security and system configuration awareness.
Requirements
4-7 years professional experience maintaining SIEM or infrastructure systems in the Information Security field.
Minimum 18-months hands-on experience in Google Sec Ops.
College degree or equivalent training with experience working in a Security Operations Center, Managed Security, or client network environment.
Understanding of network architecture and implementation is a must; ideal candidate will have worked with network security analysis.
Excellent time management, reporting, and communication skills.
Experience working with Internal and client Ticketing and Knowledge Base Systems for Incident and Problem tracking as well as procedures. (i.e. Jira, Confluence, etc.).
Experience with various SIEM security products such as: Exabeam, Chronicle, Sentinel, LogRhythm, QRadar, Splunk, and infrastructure components such as proxies, firewalls, IDS/IPS, DLP etc.
General security knowledge (GIAC, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, or other security certifications).
Knowledge of Linux and Windows Operating Systems.
An understanding of a wide array of server grade applications such as: DBMS, Exchange, DNS, SMTP, IIS, Apache, SharePoint, Active Directory, Identity Management, Patch Management, LDAP, SQL, and others.
Training and experience in one or more non-SIEM network security products to include: Enterprise endpoint security products, Network components such as Firewalls and Proxies to include Palo Alto / Checkpoint / Juniper / McAfee / Cisco / Blue Coat / Imperva or other similar network security products.
CCNA, CCDA, CCSA, CCIE, CISSP, CEH, or MCSE.
Familiarity with DevOps
Professional experience working with networks and network architecture.
Ability to participate in on-call support
Demonstrated experience and success in a Managed Service client environment.
Ability to work greater than 40 hours per week as needed.
Benefits
Work/life balance
Professional training resources
Creative problem-solving and the ability to tackle unique, complex projects
Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
The ability and technology necessary to productively work remotely/from home (where applicable)
Corporate Security Operations Lead managing security operations for Carbon60 in a hybrid environment. Involves monitoring, incident response, and security controls across cloud and internal systems.
Product Security Incident Response Manager at Autodesk responsible for external security assessments, penetration testing, and team leadership. Balancing technical work with mentorship to improve security posture.
Senior Security Operations Specialist protecting Relay's digital banking platform from security threats. Implementing advanced threat detection and incident response protocols for optimal business security.
Security Operations Specialist monitoring and responding to incidents for Fluent, Inc. Collaborating across teams to develop and maintain security best practices and compliance frameworks.
Cyber Defender (Senior SOC Analyst) at Ontinue focusing on detection and response in security operations. Collaborating with teams to enhance managed security services using Microsoft tools.
Security Operations Manager at Apollo.io ensuring effective incident detection and response in a remote environment. Leading a high - performing team and improving security processes.
Security Operations Analyst at KUBRA ensuring data protection and responding to security incidents. Join a dynamic team focused on continuous improvement in cybersecurity.
Lead incident response team managing critical incidents across IT, eCommerce, store ops & supply chain. Contract - to - permanent role with hybrid work.
Security Manager enhancing KUBRA's security posture through strategic decision making and collaboration on security processes. Protecting data assets from threats while working closely with technology and business stakeholders.
SOC Engineer role at Just Eat Takeaway.com involves monitoring and supporting global platform changes. Focus on automation and engineering support in a fast - paced, agile environment.